• Title/Summary/Keyword: image security system

Search Result 500, Processing Time 0.027 seconds

Hand Biometric Information Recognition System of Mobile Phone Image for Mobile Security (모바일 보안을 위한 모바일 폰 영상의 손 생체 정보 인식 시스템)

  • Hong, Kyungho;Jung, Eunhwa
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.319-326
    • /
    • 2014
  • According to the increasing mobile security users who have experienced authentication failure by forgetting passwords, user names, or a response to a knowledge-based question have preference for biological information such as hand geometry, fingerprints, voice in personal identification and authentication. Therefore biometric verification of personal identification and authentication for mobile security provides assurance to both the customer and the seller in the internet. Our study focuses on human hand biometric information recognition system for personal identification and personal Authentication, including its shape, palm features and the lengths and widths of the fingers taken from mobile phone photographs such as iPhone4 and galaxy s2. Our hand biometric information recognition system consists of six steps processing: image acquisition, preprocessing, removing noises, extracting standard hand feature extraction, individual feature pattern extraction, hand biometric information recognition for personal identification and authentication from input images. The validity of the proposed system from mobile phone image is demonstrated through 93.5% of the sucessful recognition rate for 250 experimental data of hand shape images and palm information images from 50 subjects.

Design and Implementation of Image Encryption Method for Multi-Parameter Chaotic System (다중변수 혼돈계를 이용한 이미지 암호화 방법의 설계 및 구현)

  • Yim, Geo-Su
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.57-64
    • /
    • 2008
  • The Security of digital images has become increasingly more important in highly computerized and interconnected world. Therefore, The chaos-based encryption algorithms have suggested some new and efficient ways to develop secure image encryption method. This paper is described for the point at issue in all chaos-based encryption method for distribution of a chaotic signals. It has a method for generation of uniformly distributed chaotic signals that we designed secure algorithm of multi-parameter chaotic systems. So we are present validity of the theoretical models for results of image encryption and decryption for proposed method.

  • PDF

Video Conference System Construction that Apply Real Time Video Encryption Techniques (실시간 동영상 암호화 기법을 적용한 화상회의 시스템 구축)

  • 최우진;김형균;오무송
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.6
    • /
    • pp.931-936
    • /
    • 2002
  • By emphasize and enhance security in encryption of same viewdata in this research, constructed video conference system that apply real time video encryption techniques that confidentiality and integrity aspect are emphasized than video conference system that depend on existent user certification techniques. Sender's image transmits Vernam's encryption process to listener by packet. Listener can display image through image's decipher process and uncompress after unite receiving transmited image. This time, solved transmission speed delay problem by video's real time encryption using Vernam's algorithm that encryption and the decipher speed are fast. Simplification problem of Vernam algorithm wished to solve Session Key that use security Key that is used encipherment and decipher in channel between Client and Server using RSA algorithm.

A Comparative Analysis on ECC(Elliptic Curve Cryptography) Operation Algorit hm for Data Protection in Video security System (영상보안시스템에서의 데이터 보호를 위한 ECC(Elliptic Curve Cryptography) 연산알고리즘 비교분석)

  • Kim, Jongmin;Choo, Hyunwook;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.37-45
    • /
    • 2019
  • Video security systems change from analog based systems to network based CCTVs. Therefore, such network based systems are always exposed not only to threats of eavesdropping and hacking, but to personal damage or public organizations' damage due to image information leakage. Therefore, in order to solve the problem, this study conducts a comparative analysis on proposes the optimal ECC(Elliptic Curve Cryptography) scalar multiplication algorithms for image information protection in data communication process and thereby proposes the optimal operation algorithm of video security system.

Implementation Mode Image Segmentation Method for Object Recognition (물체 인식을 위한 개선된 모드 영상 분할 기법)

  • Moon, Hak-Yong;Han, Wun-Dong;Cho, Heung-Gi;Han, Sung-Ryoung;Jeon, Hee-Jong
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.51 no.1
    • /
    • pp.39-44
    • /
    • 2002
  • In this paper, implementation mode image segmentation method for separate image is presented. The method of segmentation image in conventional method, the error are generated by the threshold values. To improve these problem for segmentation image, the calculation of weighting factor using brightness distribution by histogram of stored images are proposed. For safe image of object and laser image, the computed weighting factor is set to the threshold value. Therefore the image erosion and spread are improved, the correct and reliable informations can be measured. In this paper, the system of 3-D extracting information using the proposed algorithm can be applied to manufactory automation, building automation, security guard system, and detecting information system for all of the industry areas.

Development of an Image Tracking System Using an USB Camera on an Embedded System (USB Camera를 이용한 이미지 트래킹을 위한 Pan/Tilt 제어용 Embedded System 개발)

  • Kim, Hie-Sik;Nam, Chul;Ayurzana, Odgera;Ha, Kwan-Yong
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.182-184
    • /
    • 2005
  • An embedded system has been applied to many fields including households and industrial sites. The embedded system is implemented fur image tracking in security area. This system supports a fixed IP far the reliable server operation on TCP/IP networks. A real time video image on the is analyzed to detect a certain invader who jumped into the observed area. The digital camera is connected at the USB host port of the target board. The video images from the video camera is continuously analyzed and displayed at the Linux web-server. The moving vector of the invaders on the continuous image frames is calculated and then it sends the calculated pan/tilt movement. That used Block matching algorithm and edge detection algorithm for past speed. And the displacement vector is used at pan/tilt motor control through RS232 serial cable. The experiment result showed tracking performance by the moving part speed of 10 to 150 pixels/sec.

  • PDF

Interferometric Image Encryption and Decryption using Binary Phase Hologram (이진 위상 홀로그램을 이용한 간섭성 영상 암호화 및 복원)

  • 김종윤;김정우
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.3
    • /
    • pp.80-86
    • /
    • 2002
  • In this paper, we propose the new optical security technique using two phase holograms based on interferometer. The encoded random phase image does not have any information on the original image. Without Hewing the key mask, one cannot decode the encrypted image and regenerate the original image. And the use of two phase only images in the proposed security system leads to maximum optical efficiency (100% in theory). Also they cannot be detected by an intensity detector such as a CCD camera. Computer simulations and optical experiments show performance of the proposed methods.

  • PDF

Image Contents Encryption Technique for Digital Hologram Broadcasting Service (디지털 홀로그램 방송을 위한 영상 콘텐츠의 암호화)

  • Ha, Jun;Choi, Hyun-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.818-819
    • /
    • 2013
  • This paper propose a contents security technique for digital holographic display service. Digital holographic video system assumes the existing service frame for 2-dimensional or 3-dimensional video, which includes data acquisition, processing, transmission, reception, and reconstruction. In this paper, we perform the encryption of RGB image and depth-map for such a system. The experimental results showed that encrypting only 0.048% of the entire data was enough to hide the constants of the RGB image and depth-map.

  • PDF

A robust optical security system using polarization and phase masks

  • Kim, Jae-Hyun;Shin, Chang-Mok;Seo, Dong-Hoan;Kim, Jong-Yun;Park, Se-Joon;Kim, Soo-Joong
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.919-922
    • /
    • 2000
  • A robust optical security technique using ortho-gonally polarized lights in the interferometer is proposed. We use orthogonally polarized lights in order to minimize the noise generated by the refractive index change due to vibration, flow of air, change of temperature etc. To make orthogonally polarized lights the first beam splitter in the Mach-Zehnder interferometer is substituted by a polarizing beam splitter(PBS). Because of incoherence of orthogonally polarized lights, the noise generated by the change of refractive index is minimized. To encrypt an image we use the random partition and the diffusing of pixel. Finally we make Phase-only-filters of each image which is randomly partitioned and diffused pixel by pixel. Simulation results show the proposed system has the ability of encryption and decryption of an image.

  • PDF

The Authentication System in Real-Time using Face Recognition and RFID (얼굴 인식과 RFID를 이용한 실시간 인증 시스템)

  • Jee, Jeong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.263-272
    • /
    • 2008
  • The proposed system can achieve more safety of RFID system with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After it has authenticated RFID tag, additionally, the proposed system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors. the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the experimental result, the system can acquire more exact results as compared with the single authentication system when it using RFID tag and the information of color characteristics.

  • PDF